|
1 | | -from django.conf import settings |
2 | | -from django.shortcuts import resolve_url |
| 1 | + |
| 2 | +from unittest import mock |
| 3 | + |
| 4 | +from django.shortcuts import reverse |
3 | 5 | from django.test import TestCase |
4 | 6 | from django.test.utils import override_settings |
5 | 7 |
|
6 | | -from two_factor.admin import patch_admin, unpatch_admin |
7 | | - |
8 | 8 | from .utils import UserMixin |
9 | 9 |
|
10 | 10 |
|
11 | 11 | @override_settings(ROOT_URLCONF='tests.urls_admin') |
12 | | -class AdminPatchTest(TestCase): |
13 | | - |
14 | | - def setUp(self): |
15 | | - patch_admin() |
| 12 | +class TwoFactorAdminSiteTest(UserMixin, TestCase): |
| 13 | + """ |
| 14 | + otp_admin is admin console that needs OTP for access. |
| 15 | + Only admin users (is_staff and is_active) |
| 16 | + with OTP can access it. |
| 17 | + """ |
| 18 | + |
| 19 | + def test_anonymous_get_admin_index_redirects_to_admin_login(self): |
| 20 | + index_url = reverse('admin:index') |
| 21 | + login_url = reverse('admin:login') |
| 22 | + response = self.client.get(index_url, follow=True) |
| 23 | + redirect_to = '%s?next=%s' % (login_url, index_url) |
| 24 | + self.assertRedirects(response, redirect_to) |
16 | 25 |
|
17 | | - def tearDown(self): |
18 | | - unpatch_admin() |
| 26 | + def test_anonymous_get_admin_logout_redirects_to_admin_index(self): |
| 27 | + # see: django.tests.admin_views.test_client_logout_url_can_be_used_to_login |
| 28 | + index_url = reverse('admin:index') |
| 29 | + logout_url = reverse('admin:logout') |
| 30 | + response = self.client.get(logout_url) |
| 31 | + self.assertEqual( |
| 32 | + response.status_code, 302 |
| 33 | + ) |
| 34 | + self.assertEqual(response.get('Location'), index_url) |
| 35 | + |
| 36 | + def test_anonymous_get_admin_login(self): |
| 37 | + login_url = reverse('admin:login') |
| 38 | + response = self.client.get(login_url, follow=True) |
| 39 | + self.assertEqual(response.status_code, 200) |
19 | 40 |
|
20 | | - def test(self): |
21 | | - response = self.client.get('/admin/', follow=True) |
22 | | - redirect_to = '%s?next=/admin/' % resolve_url(settings.LOGIN_URL) |
| 41 | + def test_is_staff_not_verified_not_setup_get_admin_index_redirects_to_setup(self): |
| 42 | + """ |
| 43 | + admins without MFA setup should be redirected to the setup page. |
| 44 | + """ |
| 45 | + index_url = reverse('admin:index') |
| 46 | + setup_url = reverse('two_factor:setup') |
| 47 | + self.user = self.create_superuser() |
| 48 | + self.login_user() |
| 49 | + response = self.client.get(index_url, follow=True) |
| 50 | + redirect_to = '%s?next=%s' % (setup_url, index_url) |
23 | 51 | self.assertRedirects(response, redirect_to) |
24 | 52 |
|
25 | | - @override_settings(LOGIN_URL='two_factor:login') |
26 | | - def test_named_url(self): |
27 | | - response = self.client.get('/admin/', follow=True) |
28 | | - redirect_to = '%s?next=/admin/' % resolve_url(settings.LOGIN_URL) |
| 53 | + def test_is_staff_not_verified_not_setup_get_admin_login_redirects_to_setup(self): |
| 54 | + index_url = reverse('admin:index') |
| 55 | + login_url = reverse('admin:login') |
| 56 | + setup_url = reverse('two_factor:setup') |
| 57 | + self.user = self.create_superuser() |
| 58 | + self.login_user() |
| 59 | + response = self.client.get(login_url, follow=True) |
| 60 | + redirect_to = '%s?next=%s' % (setup_url, index_url) |
29 | 61 | self.assertRedirects(response, redirect_to) |
30 | 62 |
|
31 | | - |
32 | | -@override_settings(ROOT_URLCONF='tests.urls_admin') |
33 | | -class AdminSiteTest(UserMixin, TestCase): |
34 | | - |
35 | | - def setUp(self): |
36 | | - super().setUp() |
| 63 | + def test_is_staff_is_verified_get_admin_index(self): |
| 64 | + index_url = reverse('admin:index') |
37 | 65 | self.user = self.create_superuser() |
| 66 | + self.enable_otp(self.user) |
38 | 67 | self.login_user() |
39 | | - |
40 | | - def test_default_admin(self): |
41 | | - response = self.client.get('/admin/') |
| 68 | + response = self.client.get(index_url) |
42 | 69 | self.assertEqual(response.status_code, 200) |
43 | 70 |
|
44 | | - |
45 | | -@override_settings(ROOT_URLCONF='tests.urls_otp_admin') |
46 | | -class OTPAdminSiteTest(UserMixin, TestCase): |
47 | | - |
48 | | - def setUp(self): |
49 | | - super().setUp() |
| 71 | + def test_is_staff_is_verified_get_admin_password_change(self): |
| 72 | + password_change_url = reverse('admin:password_change') |
50 | 73 | self.user = self.create_superuser() |
| 74 | + self.enable_otp(self.user) |
51 | 75 | self.login_user() |
| 76 | + response = self.client.get(password_change_url) |
| 77 | + self.assertEqual(response.status_code, 200) |
52 | 78 |
|
53 | | - def test_otp_admin_without_otp(self): |
54 | | - response = self.client.get('/otp_admin/', follow=True) |
55 | | - redirect_to = '%s?next=/otp_admin/' % resolve_url(settings.LOGIN_URL) |
56 | | - self.assertRedirects(response, redirect_to) |
57 | | - |
58 | | - @override_settings(LOGIN_URL='two_factor:login') |
59 | | - def test_otp_admin_without_otp_named_url(self): |
60 | | - response = self.client.get('/otp_admin/', follow=True) |
61 | | - redirect_to = '%s?next=/otp_admin/' % resolve_url(settings.LOGIN_URL) |
62 | | - self.assertRedirects(response, redirect_to) |
63 | | - |
64 | | - def test_otp_admin_with_otp(self): |
65 | | - self.enable_otp() |
| 79 | + def test_is_staff_is_verified_get_admin_login_redirects_to_admin_index(self): |
| 80 | + login_url = reverse('admin:login') |
| 81 | + index_url = reverse('admin:index') |
| 82 | + self.user = self.create_superuser() |
| 83 | + self.enable_otp(self.user) |
66 | 84 | self.login_user() |
67 | | - response = self.client.get('/otp_admin/') |
| 85 | + response = self.client.get(login_url) |
| 86 | + self.assertEqual(response.get('Location'), index_url) |
| 87 | + |
| 88 | + @mock.patch('two_factor.views.core.signals.user_verified.send') |
| 89 | + def test_valid_login(self, mock_signal): |
| 90 | + login_url = reverse('admin:login') |
| 91 | + self.user = self.create_user() |
| 92 | + self.enable_otp(self.user) |
| 93 | + data = { 'auth-username': '[email protected]', |
| 94 | + 'auth-password': 'secret', |
| 95 | + 'login_view-current_step': 'auth'} |
| 96 | + response = self.client.post(login_url, data=data) |
68 | 97 | self.assertEqual(response.status_code, 200) |
| 98 | + |
| 99 | + # No signal should be fired for non-verified user logins. |
| 100 | + self.assertFalse(mock_signal.called) |
0 commit comments